Types of Malware and its Analysis
暂无分享,去创建一个
[1] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[2] Peter Ferrie. Attacks on Virtual Machine Emulators , 2007 .
[3] Christopher Krügel,et al. Detecting kernel-level rootkits through binary analysis , 2004, 20th Annual Computer Security Applications Conference.
[4] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[5] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[6] Somesh Jha,et al. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[7] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[8] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[9] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[10] Amit Vasudevan,et al. Stealth breakpoints , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[11] M. Curty. Quantum cryptography: Know your enemy , 2014 .
[12] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.